Privacy Policy


This Privacy Policy describes who we are, how we handle and protect your personal data and the choices available to you. This Privacy Policy is intended for you if you are a user of Tectoro EMM or any related services provided by us.

About Tectoro EMM :

Tectoro EMM is an Android Enterprise Recommended EMM (Enterprise Mobility Management) software. It helps organizations to enroll organization owned / BYOD devices using Android Enterprise Management API.

Tectoro EMM with the help of Android Enterprise, ensures your device is in compliance with the policies defined by your organization IT Administrator. This ensures that your device is safe and is ready for use for your work purposes.

Tectoro EMM comprises all apps that are mentioned below. These are available in Google Play Store. These apps are the work of Tectoro EMM and can be used only on devices that are enrolled into Tectoro EMM by your Organization. These apps are not for public usage.

Tectoro EMM apps may also be released with different names through Managed Google Play, aka organization specific exclusive play store available only through Tectoro EMM admin console.

Tectoro EMM Apps

This Privacy Policy is applicable to all the below apps :

  • Device Care : Your IT Administrator can schedule a periodic scan on your organization-owned device to ensure it is malware free.
  • Messages : Your IT Administrator can send messages to you and others in your organization. This app will display those messages to you.
  • Files : Your IT Administrator can distribute your organization specific multimedia and other content to you and others in your organization. This app will display those files to you.
  • Secure Chat : Your IT Administrator can enable you and others in your organization to chat with each other.
  • Tectoro EMM Agent : Your IT Administrator may define policies and controls required for your organization. This app helps your device to comply with those policies.
  • Tectoro EMM Launcher : This app is the same as the above Tectoro EMM Agent app. In some of our older releases it was called this name.
  • Managed Google Play Apps : All other apps released through your organization specific Managed Google Play, i.e. Iframe based console available through Tectoro EMM software.

Note : that this privacy policy is available on the application level as a pop up as well, which requires the user to give consent for us to provide the respective services.

Personal Information :

Personal Information is anything that identifies any information that can be used to identify a person. It can range from basic information, like a person's name or phone number, to intricate details, including biometric data and location tags .

It is a company policy that our customer databases remain confidential and private. We have not, will not, and won't ever sell names to "spammers" or other parties who would like to use our databases to advertise or solicit their products or services. Your private information is safe with us.

What We Collect:
Information Provided by User

The information that is being collected when the device is enrolled into the Tectoro EMM is automatic. No information is explicitly requested from the user to input.

Information Automatically Collected

The information that is automatically collected is dependent upon the features that are enabled by yourIT Administrator on your organization account in Tectoro EMM admin console. Here is the possible information that can be collected :

  • Device Hardware and Software Details
  • Apps installed on your device
  • Location
  • App Usage Details
  • Call Logs
  • SIM details
  • Battery, Wi-Fi and other device settings
  • Usage logs and Network logs
Permissions required for our apps are :

The permissions required for the apps and overall, EMM functionality, depend on the features enabled by your IT Administrator. The below list comprises a master set of all the permissions.

Storage permissions, read write, notification permissions, wallpaper, Wi-Fi state, call logs, location, request ignore battery optimizations, ic-id (sim), vibrate, package usage stats, receive boot completed, read phone state, app usage, android.uid.system for the boot logo.

How is the Information Used :

The information is being used by the IT Administrators for the features that he enables on the devices and varies from one application to another. The information gathered is used to ensure device compliance with the Organization Policies defined by your IT Administrator. The information also allows your IT administrator to take any automatic actions in case of any policy violations detected.

For example, the location information is being used by the Geo-fencing feature. The policy defined by your IT Administrator may automatically disable or lock your device if it is moved out of the defined geographical boundary.

What we Control :

Your IT Administrator may completely control your device. He can control what apps installed on your device, what controls or settings enabled on your device, wallpaper, boot animation, automatic security updates, and installs, kiosk mode, security alerts, geolocation or geofencing that can auto-lock lost or stolen devices.

Information Security :

We have taken security measures, consistent with international information practices, to protect your personal information, which offers adequate level of personal data protection according to Industry standards and best practices. These measures include technical and procedural steps to protect your data from misuse, unauthorized access or disclosure, loss, alteration or destruction.

All the sensitive information collected from your device is end-to-end encrypted, i.e., they are encrypted during transit as well as stored in encrypted format

How We Disclose Your Personal Data :

Your devices are enrolled into Tectoro EMM by your organization IT administrator to ensure they are controlled and compliant with the organization policies and are safe to use for work purposes. All the information collected about your device is shared with your organization IT administrator through Tectoro EMM admin console. The sensitive/PII information is end-to-end encrypted and hence is accessible only to your IT administrator.

Your Personal Data Rights:

According to GDPR, Data subjects (any information relating to an identified or identifiable natural person) have the right to access data, right to rectification, right to erasure and the right not to be subject to individual decisions. Data subjects/You also have the right to restriction of personal data processing and to request the deletion of the collected personal data, as well as the right to data portability. To exercise these rights, you may reach out to your organization IT administrator with a written request.

Changes to this Privacy Policy :

We may update our Privacy Policy sometimes. Thus, you are advised to review this page periodically for any changes. We will notify you of any changes by posting the new Privacy Policy on this page.

That’s it! Thanks for reading.

Contact Us:

For any queries related to the data you can reach out to your Organization IT Admin. For any queries related to system you can reach out to our customer support